Tuesday, March 29, 2011

programmers unix machine

 
Time I get a pretty interesting article, and can increase our knowledge about what exactly 'Hacker' is ... whether Kevin Midnick & Captain Zap can be called as a hacker? For more details, maybe the following article can help us to find the answers. once again this is not a pure article of my writing, but I copy and paste through my teacher blog ..
happy reading

In recent years the term hacking is looming. The book is "thin", "instant" and use the title of "hacking" into the new terms of writing popular books on Indonesia. This is a dangerous game from the publishers (who authors) because the damage could get to our young generation. Creating a culture increasingly thick that science can be obtained by means fast, instant, even just with a capital of 20-50 pages thick book. To be sure hackers are not crackers, hackers build things, while crackers damage. Let's peel on the nature of these hackers and hacking activities.

Most of the literature mentions that the term and the hacker culture was first used in 1961 when MIT had the opportunity to enjoy the PDP-1 machine. DEC's first computer production has become a favorite toy, especially the MIT student who joined the Tech Model Railroad Club. They make programming tools, making a lot of programs, develop ethics, jargon and even PDP-1, which became a video-game machine earlier generations. Culture is then known to be a true hacker culture. The hackers in the Tech Model Railroad Club became the team's core research laboratory Artificial Intelligence (AI), MIT is a pioneer in AI research in the world today.

ARPAnet project developed by the U.S. Defense Department was not free from interference by hackers at MIT. ARPAnet was the one who brings together the hacker culture from the various "tribes", for example, from Stanford University and Carnegie Mellon University (CMU). MIT hackers eventually even managed to develop its own operating system called ITS (Incompatible Time-Sharing System) is legendary, tops-10 replaces the standard operating system produced by DEC for the PDP-10. ITS was originally built with the assembler, but later changed into the language LISP, functional programming language close to the world of Artificial Intelligence.

Another creation from the MIT hackers who is legendary is Emacs (Richard Stallman), a favorite editor who still used by many programmers unix machine to date. I know the first time Emacs when entering campus at Saitama University in 1995, I used to write all my college report, read email, web browsing, reading newsgroups and even Emacs, too.
From Bell Labs hacker named Ken Thompson who is assisted by another hacker named Dennis Ritchie C language with her to develop the Unix operating system. Collaboration Thomson and Ritchie is the force that is phenomenal, because Unix and C language is a potent formula for the development of variants of the Unix operating system from anywhere to date (BSD and System V where Linux included). Also note that in 1982, hackers from Stanford and Berkeley who led William (Bill) Joy established a company called Sun Microsystems.

Era 1984 commencement of the various episodes of rapid cracking known as raised by the press and journalists. Journalists began to mistakenly refer to computer crime and its deviation as a "hacking activities" where actor called a hacker.

A hacker is actually like Richard Stallman who fought with the Free Software Foundation and decades of dreaming to build a free operating system called the HURD. Linux Torvalds is a hacker also true for remaining committed to the development of the kernel Linux root until now. Contributors to the development of Linux and other open source software also is the real hackers.

Actors carding (misuse of credit cards), phreaking, and defacing is not a hacker, but they are a cracker. Legendary phrase from Eric S. Raymond in the article entitled how changed from a hacker, "hackers and crackers to build a lot of things ruin it." True hackers are a good programmer. Something very foolish when there are people or groups who claim to be hackers but did not understand how to program. Essential nature of a hacker is happy to share, not share the tool exploits, but the sharing of knowledge. True hacker is a writer who is able to understand and write articles in the mother language and English well. Hacker is a nerd who has an attitude (attitude), good base, which would respect others, respect the people who help him, and respect for people who have been given knowledge, means or opportunity.

It is not the nature of a hacker if given the trust holding the administration on a server instead use it for cracking activity. Or even then attack and destroy the server from within by making a mockery added to the owner of the server that has given him the opportunity. With forced me to say, so I've been there. So far I always support the movement of young people in cyberspace, I am pleased with their spirit. Hundreds of community I give the domain and hosting for free as a reward Struggle for wanting to share their knowledge to other friends in the homeland. Unfortunately there are crackers who claimed hackers (though do not have the attitude as a hacker) is toying with this opportunity. Once satisfied to make a dedicated server that contains hundreds of other community sites in the provider of server-shutdown due to phreaking activities she was doing, still of cursed me with titles that are not human. Am I cured? No I will still give the trust, server support and a free domain for cyber activists.

Hackers are not the ones with nicknames, screenname or handlename a funny, silly and stupid. Eric S. Raymond calls that hide the name, is actually just a naughty, silly behavior that characterize the crackers, warez d00dz, and the losers who did not dare to be responsible for his actions. Hacker is a reputation, they are proud of the work done and want a job that is associated with their real names. Hacker does not have the computer, because the concept of hacking is real learners, enthusiastic people to work and never give up because of failure. And the hackers could appear in the field of electronics, machinery, architecture, economics, politics, etc..

Straighten out the problem of understanding the hacker is a rescue project generation and repair the nation. And this could start by improving our educational curriculum so as to educate our students become real hackers. And let us together struggle to be a hacker who could benefit and who can fix this republic was triumphant.

No comments:

Post a Comment

 
THANK YOU FOR VISITING